wp2pgpmail Security & Risk Analysis

wordpress.org/plugins/wp2pgpmail

A simple PGP Mail Form Plugin. Enter your PGP public key, then visitors will be able to send you PGP encrypted messages by mail from a form.

80 active installs v1.28 PHP 5.6+ WP 2.9.2+ Updated Feb 23, 2026
contact-formencryptencryptionpgpprivacy
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wp2pgpmail Safe to Use in 2026?

Generally Safe

Score 100/100

wp2pgpmail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The wp2pgpmail v1.28 plugin presents a mixed security posture. On the positive side, it has no recorded CVEs, indicating a potentially stable security history. The plugin also exclusively uses prepared statements for its SQL queries, which is a significant strength in preventing SQL injection vulnerabilities. Furthermore, it has a limited attack surface with only one shortcode and no unprotected AJAX handlers, REST API routes, or cron events.

However, several concerning signals emerge from the static analysis. The presence of the `proc_open` function is a significant risk, as it can be exploited for command injection if user-supplied input is not rigorously sanitized. The taint analysis reveals two high-severity flows with unsanitized paths, suggesting potential vulnerabilities related to how data is handled, particularly when it originates from external sources and is used in sensitive operations. The low percentage of properly escaped output (17%) is also a major concern, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities.

While the plugin's vulnerability history is clean, the static analysis findings, particularly the use of `proc_open` and the high-severity unsanitized paths, point to inherent risks that need immediate attention. The lack of nonce and capability checks on its entry points, coupled with the poor output escaping, means that even though no past vulnerabilities are known, the plugin is susceptible to common web attack vectors. Therefore, while its historical record is good, the code itself contains significant weaknesses that warrant a high level of caution.

Key Concerns

  • High severity unsanitized paths in taint analysis
  • High severity unsanitized paths in taint analysis
  • Dangerous function proc_open used
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

wp2pgpmail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

wp2pgpmail Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
8 prepared
Unescaped Output
24
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
20
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

proc_open$proc = proc_open($cmd, $descriptors, $pipes);phpcaptcha\securimage.php:3450

SQL Query Safety

100% prepared8 total queries

Output Escaping

17% escaped29 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
<example_form.ajax> (phpcaptcha\example_form.ajax.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

wp2pgpmail Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp2pgpmail] wp2pgpmail.php:235
WordPress Hooks 5
actionwp_enqueue_scriptswp2pgpmail.php:47
actionadmin_enqueue_scriptswp2pgpmail.php:78
actionadmin_initwp2pgpmail.php:230
actioninitwp2pgpmail.php:233
actionadmin_menuwp2pgpmail.php:234
Maintenance & Trust

wp2pgpmail Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 23, 2026
PHP min version5.6
Downloads12K

Community Trust

Rating88/100
Number of ratings5
Active installs80
Developer Profile

wp2pgpmail Developer Profile

wp2pgpmail

3 plugins · 220 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wp2pgpmail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp2pgpmail/js/rsa.js/wp-content/plugins/wp2pgpmail/js/aes-enc.js/wp-content/plugins/wp2pgpmail/js/sha1.js/wp-content/plugins/wp2pgpmail/js/base64.js/wp-content/plugins/wp2pgpmail/js/mouse.js/wp-content/plugins/wp2pgpmail/js/PGencode.js/wp-content/plugins/wp2pgpmail/js/openpgp.min.js/wp-content/plugins/wp2pgpmail/js/PGpubkey.js+1 more
Script Paths
js/rsa.jsjs/aes-enc.jsjs/sha1.jsjs/base64.jsjs/mouse.jsjs/PGencode.js+2 more
Version Parameters
wp2pgpmail/js/rsa.js?ver=wp2pgpmail/js/aes-enc.js?ver=wp2pgpmail/js/sha1.js?ver=wp2pgpmail/js/base64.js?ver=wp2pgpmail/js/mouse.js?ver=wp2pgpmail/js/PGencode.js?ver=wp2pgpmail/js/openpgp.min.js?ver=wp2pgpmail/js/PGpubkey.js?ver=wp2pgpmail/css/wp2pgpmail-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="s"action="javascript:getkey()"name="pubkey"name="vers"name="user"name="keyid"+3 more
JS Globals
keytypkeyidpubkeygetkeySecurimage
Shortcode Output
[wp2pgpmail]
FAQ

Frequently Asked Questions about wp2pgpmail